-
Notifications
You must be signed in to change notification settings - Fork 64
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat: add AmazonWebServices-NLB network plugin
Signed-off-by: clarklee92 <[email protected]>
- Loading branch information
1 parent
3c8ddbd
commit 782a250
Showing
16 changed files
with
1,880 additions
and
426 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,190 @@ | ||
English | [中文](./README.zh_CN.md) | ||
|
||
For game businesses using OKG in AWS EKS clusters, routing traffic directly to Pod ports via network load balancing is the foundation for achieving high-performance real-time service discovery. Using NLB for dynamic port mapping simplifies the forwarding chain and avoids the performance loss caused by Kubernetes kube-proxy load balancing. These features are particularly crucial for handling replica combat-type game servers. For GameServerSets with the network type specified as AmazonWebServices-NLB, the AmazonWebServices-NLB network plugin will schedule an NLB, automatically allocate ports, create listeners and target groups, and associate the target group with Kubernetes services through the TargetGroupBinding CRD. If the cluster is configured with VPC-CNI, the traffic will be automatically forwarded to the Pod's IP address; otherwise, it will be forwarded through ClusterIP. The process is considered successful when the network of the GameServer is in the Ready state. | ||
|
||
![image](./../../docs/images/aws-nlb.png) | ||
|
||
## AmazonWebServices-NLB Configuration | ||
### plugin Configuration | ||
```toml | ||
[aws] | ||
enable = true | ||
[aws.nlb] | ||
# Specify the range of free ports that NLB can use to allocate external access ports for pods, with a maximum range of 50 (closed interval) | ||
# The limit of 50 comes from AWS's limit on the number of listeners, see: https://docs.aws.amazon.com/elasticloadbalancing/latest/network/load-balancer-limits.html | ||
max_port = 32050 | ||
min_port = 32001 | ||
``` | ||
### Preparation: ### | ||
|
||
Due to the difference in AWS design, to achieve NLB port-to-Pod port mapping, three types of CRD resources need to be created: Listener/TargetGroup/TargetGroupBinding | ||
|
||
#### Deploy elbv2-controller: | ||
|
||
Definition and controller for Listener/TargetGroup CRDs: https://github.com/aws-controllers-k8s/elbv2-controller. This project links k8s resources with AWS cloud resources. Download the chart: https://gallery.ecr.aws/aws-controllers-k8s/elbv2-chart, example value.yaml: | ||
|
||
```yaml | ||
serviceAccount: | ||
annotations: | ||
eks.amazonaws.com/role-arn: "arn:aws:iam::xxxxxxxxx:role/test" | ||
aws: | ||
region: "us-east-1" | ||
endpoint_url: "https://elasticloadbalancing.us-east-1.amazonaws.com" | ||
``` | ||
The key to deploying this project lies in authorizing the k8s ServiceAccount to access the NLB SDK, which is recommended to be done through an IAM role: | ||
##### Step 1:Enable OIDC provider for the EKS cluster | ||
1. Sign in to the AWS Management Console. | ||
2. Navigate to the EKS console:https://console.aws.amazon.com/eks/ | ||
3. Select your cluster. | ||
4. On the cluster details page, ensure that the OIDC provider is enabled. Obtain the OIDC provider URL for the EKS cluster. In the "Configuration" section of the cluster details page, find the "OpenID Connect provider URL". | ||
##### Step 2:Configure the IAM role trust policy | ||
Create an IAM role: | ||
- In the IAM console, create a new IAM role and select "Custom trust policy". | ||
- Use the following trust policy to allow EKS to use this role: | ||
```json | ||
{ | ||
"Version": "2012-10-17", | ||
"Statement": [ | ||
{ | ||
"Effect": "Allow", | ||
"Principal": { | ||
"Federated": "arn:aws:iam::<AWS_ACCOUNT_ID>:oidc-provider/oidc.eks.<REGION>.amazonaws.com/id/<OIDC_ID>" | ||
}, | ||
"Action": "sts:AssumeRoleWithWebIdentity", | ||
"Condition": { | ||
"StringEquals": { | ||
"oidc.eks.<REGION>.amazonaws.com/id/<OIDC_ID>:sub": "system:serviceaccount:<NAMESPACE>:<SERVICE_ACCOUNT_NAME>", | ||
"oidc.eks.<REGION>.amazonaws.com/id/<OIDC_ID>:aud": "sts.amazonaws.com" | ||
} | ||
} | ||
} | ||
] | ||
} | ||
``` | ||
|
||
- Replace `<AWS_ACCOUNT_ID>`、`<REGION>`、`<OIDC_ID>`、`<NAMESPACE>` and `<SERVICE_ACCOUNT_NAME>` with your actual values. | ||
|
||
|
||
|
||
- Add the permission `ElasticLoadBalancingFullAccess` | ||
|
||
|
||
|
||
#### Deploy AWS Load Balancer Controller: | ||
|
||
CRD and controller for TargetGroupBinding: https://github.com/kubernetes-sigs/aws-load-balancer-controller/ | ||
|
||
Official deployment documentation: https://docs.aws.amazon.com/eks/latest/userguide/lbc-helm.html, essentially authorizing k8s ServiceAccount in a way similar to an IAM role. | ||
|
||
### Parameters | ||
|
||
#### NlbARNs | ||
- Meaning: Fill in the ARN of the nlb, you can fill in multiple, and nlb needs to be created in AWS in advance. | ||
- Format: Separate each nlbARN with a comma. For example: arn:aws:elasticloadbalancing:us-east-1:888888888888:loadbalancer/net/aaa/3b332e6841f23870,arn:aws:elasticloadbalancing:us-east-1:000000000000:loadbalancer/net/bbb/5fe74944d794d27e | ||
- Support for change: Yes | ||
|
||
#### NlbVPCId | ||
|
||
- Meaning: Fill in the vpcid where nlb is located, needed for creating AWS target groups. | ||
- Format: String. For example: vpc-0bbc9f9f0ffexxxxx | ||
- Support for change: Yes | ||
|
||
#### NlbHealthCheck | ||
|
||
- Meaning: Fill in the health check parameters for the nlb target group, can be left blank to use default values. | ||
- Format: Separate each configuration with a comma. For example: "healthCheckEnabled:true,healthCheckIntervalSeconds:30,healthCheckPath:/health,healthCheckPort:8081,healthCheckProtocol:HTTP,healthCheckTimeoutSeconds:10,healthyThresholdCount:5,unhealthyThresholdCount:2" | ||
- Support for change: Yes | ||
- Parameter explanation: | ||
- **healthCheckEnabled**:Indicates whether health checks are enabled. If the target type is lambda, health checks are disabled by default but can be enabled. If the target type is instance, ip, or alb, health checks are always enabled and cannot be disabled. | ||
- **healthCheckIntervalSeconds**:The approximate amount of time, in seconds, between health checks of an individual target. The range is 5-300. If the target group protocol is TCP, TLS, UDP, TCP_UDP, HTTP, or HTTPS, the default is 30 seconds. If the target group protocol is GENEVE, the default is 10 seconds. If the target type is lambda, the default is 35 seconds. | ||
- **healthCheckPath**:The destination for health checks on the targets. For HTTP/HTTPS health checks, this is the path. For GRPC protocol version, this is the path of a custom health check method with the format /package.service/method. The default is /Amazon Web Services.ALB/healthcheck. | ||
- **healthCheckPort**:The port the load balancer uses when performing health checks on targets. The default is traffic-port, which is the port on which each target receives traffic from the load balancer. If the protocol is GENEVE, the default is port 80. | ||
- **healthCheckProtocol**:The protocol the load balancer uses when performing health checks on targets. For Application Load Balancers, the default is HTTP. For Network Load Balancers and Gateway Load Balancers, the default is TCP. The GENEVE, TLS, UDP, and TCP_UDP protocols are not supported for health checks. | ||
- **healthCheckTimeoutSeconds**:The amount of time, in seconds, during which no response from a target means a failed health check. The range is 2–120 seconds. For target groups with a protocol of HTTP, the default is 6 seconds. For target groups with a protocol of TCP, TLS, or HTTPS, the default is 10 seconds. For target groups with a protocol of GENEVE, the default is 5 seconds. If the target type is lambda, the default is 30 seconds. | ||
- **healthyThresholdCount**:The number of consecutive health check successes required before considering a target healthy. The range is 2-10. If the target group protocol is TCP, TCP_UDP, UDP, TLS, HTTP, or HTTPS, the default is 5. For target groups with a protocol of GENEVE, the default is 5. If the target type is lambda, the default is 5. | ||
- **unhealthyThresholdCount**:The number of consecutive health check failures required before considering a target unhealthy. The range is 2-10. If the target group protocol is TCP, TCP_UDP, UDP, TLS, HTTP, or HTTPS, the default is 2. For target groups with a protocol of GENEVE, the default is 2. If the target type is lambda, the default is 5. | ||
|
||
#### PortProtocols | ||
- Meaning: Ports and protocols exposed by the pod, supports specifying multiple ports/protocols. | ||
- Format: port1/protocol1,port2/protocol2,... (protocol should be uppercase) | ||
- Support for change: Yes | ||
|
||
#### Fixed | ||
- Meaning: Whether the access port is fixed. If yes, even if the pod is deleted and rebuilt, the mapping between the internal and external networks will not change. | ||
- Format: false / true | ||
- Support for change: Yes | ||
|
||
#### AllowNotReadyContainers | ||
- Meaning: The corresponding container name that allows continuous traffic during in-place upgrades. | ||
- Format: {containerName_0},{containerName_1},... For example: sidecar | ||
- Support for change: Not changeable during in-place upgrades | ||
|
||
#### Annotations | ||
- Meaning: Annotations added to the service, supports specifying multiple annotations. | ||
- Format: key1:value1,key2:value2... | ||
- Support for change: Yes | ||
|
||
|
||
### Usage Example | ||
```shell | ||
cat <<EOF | kubectl apply -f - | ||
apiVersion: game.kruise.io/v1alpha1 | ||
kind: GameServerSet | ||
metadata: | ||
name: gs-demo | ||
namespace: default | ||
spec: | ||
replicas: 1 | ||
updateStrategy: | ||
rollingUpdate: | ||
podUpdatePolicy: InPlaceIfPossible | ||
network: | ||
networkType: AmazonWebServices-NLB | ||
networkConf: | ||
- name: NlbARNs | ||
value: "arn:aws:elasticloadbalancing:us-east-1:xxxxxxxxxxxx:loadbalancer/net/okg-test/yyyyyyyyyyyyyyyy" | ||
- name: NlbVPCId | ||
value: "vpc-0bbc9f9f0ffexxxxx" | ||
- name: PortProtocols | ||
value: "80/TCP" | ||
- name: NlbHealthCheck | ||
value: "healthCheckIntervalSeconds:15" | ||
gameServerTemplate: | ||
spec: | ||
containers: | ||
- image: registry.cn-hangzhou.aliyuncs.com/gs-demo/gameserver:network | ||
name: gameserver | ||
EOF | ||
``` | ||
|
||
Check the network status of the GameServer: | ||
|
||
```yaml | ||
networkStatus: | ||
createTime: "2024-05-30T03:34:14Z" | ||
currentNetworkState: Ready | ||
desiredNetworkState: Ready | ||
externalAddresses: | ||
- endPoint: okg-test-yyyyyyyyyyyyyyyy.elb.us-east-1.amazonaws.com | ||
ip: "" | ||
ports: | ||
- name: "80" | ||
port: 32034 | ||
protocol: TCP | ||
internalAddresses: | ||
- ip: 10.10.7.154 | ||
ports: | ||
- name: "80" | ||
port: 80 | ||
protocol: TCP | ||
lastTransitionTime: "2024-05-30T03:34:14Z" | ||
networkType: AmazonWebServices-NLB | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,186 @@ | ||
中文 | [English](./README.md) | ||
|
||
对于在AWS EKS集群中使用OKG的游戏业务,通过网络负载均衡将流量直接路由到Pod端口是实现高性能实时服务发现的基础。利用NLB进行动态端口映射,简化了转发链路,规避了Kubernetes kube-proxy负载均衡带来的性能损耗。这些特性对于处理副本战斗类型的游戏服务器尤为关键。对于指定了网络类型为AmazonWebServices-NLB的GameServerSet,AmazonWebServices-NLB网络插件将会调度一个NLB,自动分配端口,创建侦听器和目标组,并通过TargetGroupBinding CRD将目标组与Kubernetes服务进行关联。如果集群配置了VPC-CNI,那么此时流量将自动转发到Pod的IP地址;否则将通过ClusterIP转发。观察到GameServer的网络处于Ready状态时,该过程即执行成功。 | ||
![image](./../../docs/images/aws-nlb.png) | ||
|
||
## AmazonWebServices-NLB 相关配置 | ||
### plugin配置 | ||
```toml | ||
[aws] | ||
enable = true | ||
[aws.nlb] | ||
# 填写nlb可使用的空闲端口段,用于为pod分配外部接入端口,范围最大为50(闭区间) | ||
# 50限制来自AWS对侦听器数量的限制,参考:https://docs.aws.amazon.com/elasticloadbalancing/latest/network/load-balancer-limits.html | ||
max_port = 32050 | ||
min_port = 32001 | ||
``` | ||
### 准备: ### | ||
|
||
由于AWS的设计有所区别,要实现NLB端口与Pod端口映射,需要创建三类CRD资源:Listener/TargetGroup/TargetGroupBinding | ||
|
||
#### 部署elbv2-controller: | ||
|
||
Listener/TargetGroup的CRD定义及控制器:https://github.com/aws-controllers-k8s/elbv2-controller ,该项目联动了k8s资源与AWS云资源,chart下载:https://gallery.ecr.aws/aws-controllers-k8s/elbv2-chart ,value.yaml示例: | ||
|
||
```yaml | ||
serviceAccount: | ||
annotations: | ||
eks.amazonaws.com/role-arn: "arn:aws:iam::xxxxxxxxx:role/test" | ||
aws: | ||
region: "us-east-1" | ||
endpoint_url: "https://elasticloadbalancing.us-east-1.amazonaws.com" | ||
``` | ||
部署该项目最关键的在于授权k8s ServiceAccount访问NLB SDK,推荐通过IAM角色的方式: | ||
##### 步骤 1:为 EKS 集群启用 OIDC 提供者 | ||
1. 登录到 AWS 管理控制台。 | ||
2. 导航到 EKS 控制台:https://console.aws.amazon.com/eks/ | ||
3. 选择您的集群。 | ||
4. 在集群详细信息页面上,确保 OIDC 提供者已启用。获取 EKS 集群的 OIDC 提供者 URL。在集群详细信息页面的 “Configuration” 部分,找到 “OpenID Connect provider URL”。 | ||
##### 步骤 2:配置 IAM 角色信任策略 | ||
创建 IAM 角色: | ||
- 在 IAM 控制台中,创建一个新的 IAM 角色,并选择 “Custom trust policy”。 | ||
- 使用以下信任策略,允许 EKS 使用这个角色: | ||
```json | ||
{ | ||
"Version": "2012-10-17", | ||
"Statement": [ | ||
{ | ||
"Effect": "Allow", | ||
"Principal": { | ||
"Federated": "arn:aws:iam::<AWS_ACCOUNT_ID>:oidc-provider/oidc.eks.<REGION>.amazonaws.com/id/<OIDC_ID>" | ||
}, | ||
"Action": "sts:AssumeRoleWithWebIdentity", | ||
"Condition": { | ||
"StringEquals": { | ||
"oidc.eks.<REGION>.amazonaws.com/id/<OIDC_ID>:sub": "system:serviceaccount:<NAMESPACE>:<SERVICE_ACCOUNT_NAME>", | ||
"oidc.eks.<REGION>.amazonaws.com/id/<OIDC_ID>:aud": "sts.amazonaws.com" | ||
} | ||
} | ||
} | ||
] | ||
} | ||
``` | ||
|
||
- 将 `<AWS_ACCOUNT_ID>`、`<REGION>`、`<OIDC_ID>`、`<NAMESPACE>` 和 `<SERVICE_ACCOUNT_NAME>` 替换为您的实际值。 | ||
|
||
- 添加权限 `ElasticLoadBalancingFullAccess` | ||
|
||
|
||
|
||
#### 部署AWS Load Balancer Controller: | ||
|
||
TargetGroupBinding的CRD及控制器:https://github.com/kubernetes-sigs/aws-load-balancer-controller/ | ||
|
||
官方部署文档:https://docs.aws.amazon.com/eks/latest/userguide/lbc-helm.html 其本质也是通过授权k8s ServiceAccount一个IAM角色的方式。 | ||
|
||
### 参数 | ||
|
||
#### NlbARNs | ||
- 含义:填写nlb的arn,可填写多个,需要现在【AWS】中创建好nlb。 | ||
- 填写格式:各个nlbARN用,分割。例如:arn:aws:elasticloadbalancing:us-east-1:888888888888:loadbalancer/net/aaa/3b332e6841f23870,arn:aws:elasticloadbalancing:us-east-1:000000000000:loadbalancer/net/bbb/5fe74944d794d27e | ||
- 是否支持变更:是 | ||
|
||
#### NlbVPCId | ||
|
||
- 含义:填写nlb所在的vpcid,创建AWS目标组需要。 | ||
- 填写格式:字符串。例如:vpc-0bbc9f9f0ffexxxxx | ||
- 是否支持变更:是 | ||
|
||
#### NlbHealthCheck | ||
|
||
- 含义:填写nlb目标组的健康检查参数,可不填使用默认值。 | ||
- 填写格式:各个配置用,分割。例如:"healthCheckEnabled:true,healthCheckIntervalSeconds:30,healthCheckPath:/health,healthCheckPort:8081,healthCheckProtocol:HTTP,healthCheckTimeoutSeconds:10,healthyThresholdCount:5,unhealthyThresholdCount:2" | ||
- 是否支持变更:是 | ||
- 参数解释: | ||
- **healthCheckEnabled**:指示是否启用了健康检查。如果目标类型是lambda,默认情况下健康检查是禁用的,但可以启用。如果目标类型是instance、ip或alb,健康检查总是启用的,且不能禁用。 | ||
- **healthCheckIntervalSeconds**:每个目标之间健康检查的时间间隔(以秒为单位)。 取值范围为5-300秒。如果目标组协议是TCP、TLS、UDP、TCP_UDP、HTTP或HTTPS,默认值为30秒。 如果目标组协议是GENEVE,默认值为10秒。如果目标类型是lambda,默认值为35秒。 | ||
- **healthCheckPath**:[HTTP/HTTPS健康检查] 目标健康检查的路径。 [HTTP1或HTTP2协议版本] ping路径。默认值为/。 [GRPC协议版本] 自定义健康检查方法的路径,格式为/package.service/method。默认值为/Amazon Web Services.ALB/healthcheck。 | ||
- **healthCheckPort**:负载均衡器在对目标执行健康检查时使用的端口。 如果协议是HTTP、HTTPS、TCP、TLS、UDP或TCP_UDP,默认值为traffic-port,这是每个目标接收负载均衡器流量的端口。 如果协议是GENEVE,默认值为端口80。 | ||
- **healthCheckProtocol**:负载均衡器在对目标执行健康检查时使用的协议。 对于应用负载均衡器,默认协议是HTTP。对于网络负载均衡器和网关负载均衡器,默认协议是TCP。 如果目标组协议是HTTP或HTTPS,则不支持TCP协议进行健康检查。GENEVE、TLS、UDP和TCP_UDP协议不支持健康检查。 | ||
- **healthCheckTimeoutSeconds**:在目标没有响应的情况下,认为健康检查失败的时间(以秒为单位)。取值范围为2-120秒。对于HTTP协议的目标组,默认值为6秒。对于TCP、TLS或HTTPS协议的目标组,默认值为10秒。对于GENEVE协议的目标组,默认值为5秒。如果目标类型是lambda,默认值为30秒。 | ||
- **healthyThresholdCount**:在将目标标记为健康之前所需的连续健康检查成功次数。取值范围为2-10。如果目标组协议是TCP、TCP_UDP、UDP、TLS、HTTP或HTTPS,默认值为5。 对于GENEVE协议的目标组,默认值为5。如果目标类型是lambda,默认值为5。 | ||
- **unhealthyThresholdCount**:指定在将目标标记为不健康之前所需的连续健康检查失败次数。取值范围为2-10。如果目标组的协议是TCP、TCP_UDP、UDP、TLS、HTTP或HTTPS,默认值为2。如果目标组的协议是GENEVE,默认值为2。如果目标类型是lambda,默认值为5。 | ||
|
||
#### PortProtocols | ||
- 含义:pod暴露的端口及协议,支持填写多个端口/协议 | ||
- 填写格式:port1/protocol1,port2/protocol2,...(协议需大写) | ||
- 是否支持变更:是 | ||
|
||
#### Fixed | ||
- 含义:是否固定访问端口。若是,即使pod删除重建,网络内外映射关系不会改变 | ||
- 填写格式:false / true | ||
- 是否支持变更:是 | ||
|
||
#### AllowNotReadyContainers | ||
- 含义:在容器原地升级时允许不断流的对应容器名称,可填写多个 | ||
- 填写格式:{containerName_0},{containerName_1},... 例如:sidecar | ||
- 是否支持变更:在原地升级过程中不可变更 | ||
|
||
#### Annotations | ||
- 含义:添加在service上的anno,可填写多个 | ||
- 填写格式:key1:value1,key2:value2... | ||
- 是否支持变更:是 | ||
|
||
|
||
### 使用示例 | ||
```shell | ||
cat <<EOF | kubectl apply -f - | ||
apiVersion: game.kruise.io/v1alpha1 | ||
kind: GameServerSet | ||
metadata: | ||
name: gs-demo | ||
namespace: default | ||
spec: | ||
replicas: 1 | ||
updateStrategy: | ||
rollingUpdate: | ||
podUpdatePolicy: InPlaceIfPossible | ||
network: | ||
networkType: AmazonWebServices-NLB | ||
networkConf: | ||
- name: NlbARNs | ||
value: "arn:aws:elasticloadbalancing:us-east-1:xxxxxxxxxxxx:loadbalancer/net/okg-test/yyyyyyyyyyyyyyyy" | ||
- name: NlbVPCId | ||
value: "vpc-0bbc9f9f0ffexxxxx" | ||
- name: PortProtocols | ||
value: "80/TCP" | ||
- name: NlbHealthCheck | ||
value: "healthCheckIntervalSeconds:15" | ||
gameServerTemplate: | ||
spec: | ||
containers: | ||
- image: registry.cn-hangzhou.aliyuncs.com/gs-demo/gameserver:network | ||
name: gameserver | ||
EOF | ||
``` | ||
|
||
检查GameServer中的网络状态: | ||
``` | ||
networkStatus: | ||
createTime: "2024-05-30T03:34:14Z" | ||
currentNetworkState: Ready | ||
desiredNetworkState: Ready | ||
externalAddresses: | ||
- endPoint: okg-test-yyyyyyyyyyyyyyyy.elb.us-east-1.amazonaws.com | ||
ip: "" | ||
ports: | ||
- name: "80" | ||
port: 32034 | ||
protocol: TCP | ||
internalAddresses: | ||
- ip: 10.10.7.154 | ||
ports: | ||
- name: "80" | ||
port: 80 | ||
protocol: TCP | ||
lastTransitionTime: "2024-05-30T03:34:14Z" | ||
networkType: AmazonWebServices-NLB | ||
``` |
Oops, something went wrong.